Cybersecurity News

10 Best Open-Source Blue Team Tools – 2025

Companies evaluate their cybersecurity posture and protect network infrastructur...

WinRAR “Mark of the Web” Bypass Vulnerability Let Attac...

A newly disclosed vulnerability in WinRAR allows attackers to bypass a core Wind...

Sophisticated QR Code Phishing Attack Targeting Microso...

A new sophisticated phishing campaign leveraging QR codes to steal Microsoft 365...

Cisco Smart Licensing Utility Vulnerabilities Let Attac...

Two critical vulnerabilities were actively exploited in Cisco Smart Licensing Ut...

Prince Ransomware – An Open Source Ransomware Builder T...

Cybersecurity experts observed the emergence of a concerning trend in which rans...

Gootloader Malware Attacking Users Via Google Search Ad...

The notorious Gootloader malware has reemerged with evolved tactics, now leverag...

Brinker Named Among “10 Most Promising Defense Tech Sta...

Brinker, an innovative narrative intelligence platform dedicated to combating di...

North Korean IT Workers Attacking European Organization...

North Korean IT workers have significantly expanded their operations beyond the ...

How Fileless Malware Works? – Analysis of Real Samples

You might think that catching malware is all about spotting shady files on your ...

ChatGPT Down For Thousands Of Users Worldwide – Latest ...

ChatGPT, the popular AI chatbot developed by OpenAI, experienced a significant o...

Check Point Acknowledges Data Breach, Claims Informatio...

Check Point Software Technologies has confirmed a data breach following claims b...

Top 30 Best Penetration Testing Tools – 2025

Penetration testing, also known as ethical hacking, is a critical process in cyb...

Linux Lite 7.4 Final Released with GUI Updates & Bug Fixes

Linux Lite 7.4 Final has officially been released and is now available for downl...

Microsoft Uncovers Several Vulnerabilities in GRUB2, U-...

Microsoft has discovered multiple critical vulnerabilities affecting widely used...

Apple Warns of Three 0-Day Vulnerabilities Actively Exp...

Apple has issued an urgent security advisory concerning three critical zero-day ...

CrushFTP Vulnerability Exploited in Attacks Following P...

Security researchers have confirmed active exploitation attempts targeting the c...

CISA Warns of Cisco Smart Licensing Utility Credential ...

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical...

Hackers Scanning From 24,000 IPs to Gain Access to Palo...

Researchers have detected an alarming surge in malicious scanning activity targe...

Hackers Scanning From 24,000 IP’s to Gain Access to Pal...

Researchers have detected an alarming surge in malicious scanning activity targe...

Lazarus Group is No Longer Consider a Single APT Group,...

The cybersecurity landscape is witnessing a growing complexity in the attributio...

Cannon Printer Vulnerability Let Attackers Execute Arbi...

Canon has issued a critical security advisory regarding a severe vulnerability d...

Konni RAT Exploit Windows Explorer To Launches a Multi-...

The notorious Konni RAT (Remote Access Trojan) has evolved to leverage a sophist...

Technical Analysis Published for OpenSSH’s Agent Forwar...

Security researchers have published a detailed technical analysis of a critical ...

CrushFTP Vulnerability Exploited to Gain Full Server Ac...

A critical vulnerability (CVE-2025-2825) in CrushFTP, a widely used enterprise f...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.